/

Beyond Trust

Beyond Trust

The BeyondTrust integration replaces password-based authentication for Privileged Remote Access and Remote Support with verified biometric login.

Integration type

Helpdesk

Overview

1Kosmos integrates with BeyondTrust Privileged Remote Access (PRA) and BeyondTrust Remote Support as a SAML 2.0 identity provider, enabling representatives and administrators to authenticate using biometric passwordless login via the 1Kosmos mobile app. Once configured, users who access the BeyondTrust login page are redirected to 1Kosmos for biometric verification before being returned to their privileged session.

What we solve

BeyondTrust PRA/Remote Support environments need stronger assurance that privileged representatives and admins are the right individuals before granting access to high-risk remote sessions. This integration configures 1Kosmos as the SAML 2.0 identity provider so privileged logins are protected with biometric, passwordless authentication, reducing credential theft and session hijacking risk.

The SAML configuration is performed in the BeyondTrust admin console under Users and Security → Security Providers. BeyondTrust supports uploading IdP metadata directly, which simplifies the setup by auto-populating the SSO URL and certificate fields from the 1Kosmos metadata file. BeyondTrust also allows downloading its own SP metadata for import into AdminX.

The integration uses HTTP POST binding. Both IdP-initiated and SP-initiated SSO flows are supported depending on BeyondTrust configuration.


Prerequisites

  • Active 1Kosmos tenant: Administrator access to the AdminX portal. Contact 1kosmos.com/contact if not yet provisioned.

  • BeyondTrust administrator access: Admin rights to the BeyondTrust admin console, including access to Users and Security → Security Providers.

  • BeyondTrust version compatibility: SAML SSO is available on BeyondTrust PRA and Remote Support. Confirm your deployment version supports SAML from the BeyondTrust documentation at docs.beyondtrust.com.

  • Group policy configured in BeyondTrust: At least one BeyondTrust group policy must exist before adding the SAML security provider, as all authenticating users must be assigned to a policy.

  • 1Kosmos mobile app installed: Users must have the app on iOS or Android with biometrics enrolled before testing.


Configuration values

Values to collect from 1Kosmos AdminX (IdP) for BeyondTrust:

Field

Where to find it

SAML Metadata URL or XML file

AdminX → Settings → IdP Configuration → Metadata URL (or download XML)

SSO URL

AdminX → Settings → IdP Configuration → Single SignOn Service URL

IdP Entity ID

AdminX → Settings → IdP Configuration → Core Configuration

Signing Certificate (PEM)

AdminX → Settings → IdP Configuration → View Certificate → Public Key

Values to collect from BeyondTrust (SP) for AdminX:

Field

Where to find it

ACS URL (Assertion Consumer Service URL)

BeyondTrust admin console → Users and Security → Security Providers → SAML2 → Service Provider Settings section

SP Entity ID

Same Service Provider Settings section; this is your BeyondTrust site URL

SP Metadata (optional)

Click Download Service Provider Metadata in the Security Providers screen to export for import into AdminX


Integration steps

Step 1: Add the SAML security provider in BeyondTrust

  • Log in to the BeyondTrust admin console at your site URL (e.g., https://your-site.beyondtrustcloud.com/login).

  • Navigate to Users and Security → Security Providers.

  • Click Add and select SAML2 from the dropdown.

  • In the Identity Provider Configuration section, click Upload Identity Provider Metadata and upload the 1Kosmos metadata XML file, or manually enter the 1Kosmos SSO URL and paste the signing certificate.

  • In the Service Provider Settings section, note the ACS URL and Entity ID values displayed. You will need these for AdminX.

  • Under User Attribute Settings, confirm the Username attribute is set to the field that matches the NameID value sent by 1Kosmos (typically email).

  • Under Authorization Settings, assign a Default Group Policy. This is required for all SAML-authenticated users who are not specifically mapped to another group.

  • Save the configuration.

Step 2: Add BeyondTrust as a SAML application in AdminX

  • Log in to the AdminX portal and navigate to Applications → Add Application.

  • Scroll to Custom App, select SAML 2.0 Generic, and click Add integration.

  • Enter "BeyondTrust PRA" or "BeyondTrust Remote Support" as the Application Name, set Instance to Production, and enter the BeyondTrust login URL as the Application Access URL. Click Next.

  • Set the NameID Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress and NameID Value to email.

  • Add claims mappings for email (Username) and any group attributes required by your BeyondTrust group policy configuration. Click Next.

  • Enter the BeyondTrust SP Entity ID and ACS URL. Set Method to POST, enable Assertion signing, and click Save.

Step 3: Test the integration

  • Log out of BeyondTrust completely.

  • Navigate to the BeyondTrust login page and click Use SAML Authentication.

  • You will be redirected to the 1Kosmos login screen. Open the 1Kosmos mobile app, scan the QR code, and complete biometric authentication.

  • Confirm you are returned to BeyondTrust as an authenticated representative or administrator with the correct group policy applied.

  • Test with a single account before enabling SAML as the required authentication method for all users.



Attribute mappings

Source (1Kosmos)

Target (BeyondTrust)

Description

user.email

Username (NameID)

Primary identifier for user lookup in BeyondTrust

user.email

E-mail attribute

Email address for the authenticated user

group membership (optional)

Groups attribute

Group name for policy assignment; configure in AdminX claims mapping if used


Integration notes

BeyondTrust uses the SSO URL protocol binding setting (HTTP Redirect or HTTP POST) to determine how it communicates with the identity provider.

If 1Kosmos requires POST binding, confirm this is set correctly in the Security Provider configuration. If request signing is enabled in BeyondTrust, the SSO binding is automatically restricted to HTTP Redirect.

For organizations using BeyondTrust for both Privileged Remote Access and Remote Support, each product requires a separate SAML security provider configuration, though both can point to the same 1Kosmos IdP.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.